User GuideP 501/502

Specifying Address Book Access Permissions

You can specify who is allowed to access the data in the Address Book using a web browser from networked computers. (We use Web Image Monitor installed on this machine.) To protect the data from unauthorized users, you can also encrypt the data in the Address Book.

Access permissions can be specified by the users registered in the Address Book, users with full control privileges, and user administrator.

1Open a web browser from a networked computer, and then log in to Web Image Monitor as the user administrator.

For details on how to log in, see Administrator Login Method.

2Point to [Device Management], and then click [Address Book].

3Select the user you want to specify in the address list.

4Click [Detail Input], and then click [Change].

5Click [Change] under "Access Privilege" in the "Protect Destination" section of the "Protection" area.

6Specify the access permission, and then click [OK].

The access permission specified in "All Users" will be applied to all users.

7Click [OK].

8Log out.

For details about logging out, see Administrator Logout Method.

Note

  • "Edit", "Edit / Delete", and "Full Control" access permissions allow users to perform operations that could result in loss of or changes to sensitive information. We recommend you only grant the "Read-only" permission to general users.